Welcome to SearchSecurity.com's supplement to the latest issue of Information Security magazine. Now that you've read the story in the magazine, continue to explore these topics on SearchSecurity.com.

Keeping the Oil & Data Flowingby Mike Mimoso
Oil giant ChevronTexaco has baked risk management into each of its business processes and made data protection an integral part of its practices. It's easy to understand why since the company stores more than 500 terabytes of technical data around oil field exploration activities and generates 350 terabytes each year for seismic projects. Part of ChevronTexaco's strategy involves consolidating its data management policies. In this on-demand webcast, hear how you can find trigger points that indicate your corporate security policies should be updated and why risk assessment results are essential for developing sound policies.
>> CLICK TO LISTEN TO THIS WEBCAST

Learn about the essential characteristics of the latest Security Information Management solutions (SIMs) and how the technology has developed in this expert webcast.

Perspectives: Linux v. Windows Is Windows really easier to lock down than Linux? A controversial report from Security Innovation has a lot of IT professionals talking. Read what your peers have to say and then share your thoughts on whether the Penguin plays second fiddle when it comes to security.
>>CLICK TO SEE OUR USERS' SOUNDOFF POSTS

Ping: MassMutual's Bruce Bonsall MassMutual Financial Group CISO Bruce Bonsall relays the process his organization uses to ensure that security is factored into every IT project. Read how Bonsall learned to speak in a language business folks could understand.
>>CLICK TO READ THE ARTICLE

Identity Management: Managing Federated Relationships Federated identity management simplifies and protects the online registration and access control process for consumers and extranet partners. SAML is the protocol for leveraging federated relationships. Information Security contributor Dick Mackey goes online with a webcast that demystifies SAML. He also shares technical advice on the dangers of using XML and the extent to which new devices can help you filter out XML-based attacks.
>> CLICK TO PREREGISTER FOR THE WEBCAST

Learn tactics for securing your e-mail systems in this three lesson course led by our guest instructor, Joel Snyder. Participants who register with a valid e-mail address and attend all three course webcasts will receive a certificate of completion from SearchSecurity.com. In addition, through our agreement with (ISC)², all CISSPs and SSCPs can earn 1 CPE credit per lesson webcast.

E-Handbook

0 comments

E-Mail

Username / Password

Password

By submitting you agree to receive email from TechTarget and its partners. If you reside outside of the United States, you consent to having your personal data transferred to and processed in the United States. Privacy